XYGATE User Authentication Reference Manual
XYGATE
®
 User Authentication
™
 Reference Manual   
Chapter 19. XUA Auditing and Audit Reports 
XYPRO Technology Corporation  183  Proprietary and Confidential 
When you are satisfied with all your selection criteria, press Z to create the report and 
exit from the macro. 
If you press ZP, the macro will generate the report and put you into the PERUSE 
program specified by the PERUSE_OBJECT keyword (page 236) in the UACONF file. 
When you have examined, printed or written the report to an edit file, and type EXIT, 
you will be returned to the Report Selection screen where you may resume report 
selection. 
To CLOSE the Report Selection screen, select X to return to your TACL prompt. 
Note: Prompts will show a default value inside a pair of angle brackets <>. Press 
Enter ( 
   ) without any input to accept the default value shown. 
19.5.1  Audit File 
Enter the name of the audit file you want to use to generate the report. If more than 
one audit file is shown, the current audit file will be the default value. 
XUA will display a list of all the audit files included in the current UACONF file. Old 
(rolled-over) audit files will also be displayed. You may also select an audit file that is 
not displayed. 
To choose an audit file other than the one currently in use, select A. 
Example: 
Selection? A 
You may choose one of the following audit files to report from 
$SYSTEM.XYGATEUA 
    CODE    EOF  LAST MODIFIED OWNER RWEP  PExt  SExt 
AUD00001   3333   471040 14FEB2004 2:20 222,80 NUUU  300  300 
$SYSTEM.XYGATEUA 
    CODE    EOF  LAST MODIFIED OWNER RWEP  PExt  SExt 
AUDIT  O  3333   569344 04MAR2004 5:15 222,80 NUUU  300  300 
$SYSTEM.XYGATEUA 
    CODE    EOF  LAST MODIFIED OWNER RWEP  PExt  SExt 
AUDIT1   3333    16384 06FEB2004 5:34 222,80 NUUU  300  300 
$SYSTEM.XYGATEUA 
Name of audit log <$SYSTEM.XYGATEUA.AUDIT>?  










